|Publication number||US7591421 B2|
|Application number||US 11/247,253|
|Publication date||Sep 22, 2009|
|Filing date||Oct 12, 2005|
|Priority date||Oct 20, 2000|
|Also published as||CA2425189A1, DE60144402D1, EP1328888A1, EP1328888A4, EP1840854A2, EP1840854A3, EP1840854B1, US7258276, US7293705, US7735732, US7784689, US7942321, US7967199, US8231053, US20030034390, US20040178264, US20040232230, US20040232231, US20060081705, US20060190628, US20090283590, US20110234371, WO2002035432A1|
|Publication number||11247253, 247253, US 7591421 B2, US 7591421B2, US-B2-7591421, US7591421 B2, US7591421B2|
|Inventors||William A. Linton, John Linton, Julia E. Krueger, Michael P. Dearing|
|Original Assignee||Promega Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (110), Non-Patent Citations (68), Referenced by (8), Classifications (23), Legal Events (2) |
|External Links: USPTO, USPTO Assignment, Espacenet|
Radio frequency identification method and system of distributing products
US 7591421 B2
A method and system for vending products from a defined area, such as a micro-warehouse with a door. The method includes fitting each product with a radio frequency identification tag, positioning the plurality of products in a micro-warehouse, sensing opening and closing of the micro-warehouse door, scanning the plurality of products in the micro-warehouse upon sensing closing of the door to determine the number and type of products in the micro-warehouse, generating a message based on the number and type of products in the micro-warehouse, transmitting the message to a remote processor or server, and maintaining an inventory in the remote processor based on the message. The system is designed to be accessed by authorized individuals possessing some type of code or identifying mechanism. The micro-warehouses may be cabinets, refrigerators, secured rooms, or similar storage units or areas.
1. A method comprising:
detecting, using a sensor, a first closing of a door of an apparatus and, in response to the detection of the first closing of the door of the apparatus, automatically scanning the interior of the apparatus using RFID so as to obtain a first RFID scanning result;
detecting, using the sensor, opening of the door of the apparatus and, in response to the detection of opening of the door of the apparatus, disabling an RFID scanning system used to perform the RFID scanning:
detecting, using the sensor, a second closing of the door of the apparatus and, in response to the detection of the second closing of the door of the apparatus, automatically scanning the interior of the apparatus using RFID so as to obtain a second RFID scanning result;
determining whether an item inventory for the apparatus has changed in accordance with a comparison between the first RFID scanning result and the second RFID scanning result;
determining an amount of time that an item having an RFID tag has spent in the interior of the apparatus in accordance with the first RFID scanning result and the second RFID scanning result;
comparing the amount of time to a shelf life for the item to determine if the item has expired; and
in response to the determination that the item has expired, (a) generating an expiration message indicating that the item has expired, and (b) placing the apparatus into a lock down condition that continues until the item has been removed from the interior of the apparatus.
2. The method according to claim 1, wherein the method further includes a step of e-mailing the expiration message to an e-mail address.
3. The method according to claim 1, wherein the apparatus is selected from the group consisting of a refrigerator, a freezer, a container, and a cabinet.
4. The method according to claim 1, wherein the item comprises a life science research product.
5. The method according to claim 4, wherein the life science research product is selected from the group consisting of enzyme, assay, cloning vector, and competent cell.
6. The method according to claim 1, further comprising reading a fingerprint and unlocking the apparatus in accordance with the fingerprint read in said reading step.
7. The method according to claim 1, further comprising reading an RFID badge and unlocking the apparatus in accordance with results of said reading step.
8. The method according to claim 7
, wherein said unlocking step comprises controlling a solenoid of an electric actuated lock with which the apparatus is equipped,
wherein the sensor is a proximity sensor,
wherein the detection of closing of the door comprises sensing output of the proximity sensor,
wherein the RFID scanning uses an antenna mounted in the apparatus, and
wherein passive RFID tags are used.
9. The method according to claim 8, wherein the item comprises a biological product.
10. The method according to claim 9, wherein the biological product is selected from the group consisting of an enzyme, an assay, and a cloning vector.
This application is a division of application Ser. No. 09/981,219 filed Oct. 16, 2001, which claims the benefit of U.S. Provisional Application No. 60/241,907 filed Oct. 20, 2000.
BACKGROUND OF THE INVENTION
The present invention relates to methods and systems for distributing products to customers. More particularly, the invention relates to a method and system that tracks the use of products using radio frequency tags and provides information to a central computer to enable automated restocking, inventory, tracking, or reordering of the products.
The Internet, EDI, and similar systems permit businesses and ordinary consumers to order goods. However, the delivery of those goods still depends on distribution systems that are based in the physical world. The science-fiction ideal of being able to instantly have goods pop out of a computer or to receive them through a “transporter” or some other device has not yet been realized, and probably will not for many, many years. Presently, consumers may have goods shipped via various overnight delivery services. One drawback of present delivery technology is that it is primarily paper-based. Orders are made on paper and delivery involves shipping invoices, receipts, and other paperwork, which is costly to handle and annoying to many people. Even with technology that is not paper-based, ordering and receiving goods requires a number of steps. For example, for a typical Internet order, a consumer must view the applicable Web site, select the item, such as by clicking on an icon, fill out an electronic order form, and wait for the product to be delivered. Regardless of whether paper-based or electronic technology is used, present delivery methods usually require that the customer or his or her agent be present at a physical location to take the delivery of the ordered product. Further, delivery is usually made to a loading dock or similar location. This requires some internal distribution system to deliver the goods from the initial delivery point to the location where it is actually needed.
SUMMARY OF THE INVENTION
Accordingly, there is a need to improve the distribution of goods so that consumers experience distribution of goods at a location proximate to where the consumer will use the goods without requiring paper or computer ordering. There is also a need for a distribution system that requires less user intervention and data input than existing systems.
The invention provides a system and method where a user need only find the product of interest and take that product. As compared to most Internet-based systems and methods, the invention is “clickless.” In other words, the invention requires little or no manual input from users. The invention provides a system for distributing a plurality of products. Each of the products has a radio frequency (“RF”) tag. As used herein, radio frequency means electromagnetic radiation that lies between audible and infrared radiation. Each tag is encoded with a unique identifying code. In one embodiment, the system is designed to be accessed by individuals possessing a radio frequency user badge with an identifying code. Alternatively, the system could rely on magnetic swipe cards, password systems, biometric devices (such as a retinal scanner, thumbprint reader, voice identification unit, or the like), or other systems for limiting access to authorized individuals.
The system includes one or more cabinets, refrigerators, similar storage units, (generically referred to as “micro-warehouses”) or even secured rooms that are stocked with the RF tagged products and accessed by individuals through one of the mechanisms described above. In one embodiment, each micro-warehouse has a door that may be equipped with a lock (such as an electric actuated lock), an antenna or antenna array mounted on or in the micro-warehouse, a client controller coupled to the lock and the antenna, and an output device such as a light or display. Using a signal from the antenna or other input device, the client controller checks the identity of the individual accessing the micro-warehouse, such as by reading the code of the user badge. The output device is then activated to indicate whether the individual attempting to access the micro-warehouse is authorized to access the unit. If the code or other identifier matches stored records of authorized users, the client controller opens the door and the user may remove desired products from the micro-warehouse. Once the user closes the door, the client controller performs a scan of the products remaining in the micro-warehouse to determine the identity of each of the products. The client controller then generates a message including the identity of each of the products or other message related to the products taken, and sends that message to a server. The server tracks product and user information automatically, that is, without relying on user input. In particular, the server tracks product inventory, customer usage, restocking, usage frequency, faults, micro-warehouse temperature, timing, and other information. The server also generates orders for products taken from the micro-warehouse by the user. The server can be programmed to automatically place those orders, with the result that the system is “clickless.” That is, the system eliminates the need for the customer to re-order consumed items.
In addition to the features noted above, the system may also locate the position or presence of one or more specific products in a micro-warehouse by conducting a scan of the micro-warehouse. In this way, the system can sense a disordered state of the product in the micro-warehouse. For example, the system can detect whether all of the components in a kit product are in the relevant kit box. Further, a product scan can detect whether any product in the micro-warehouse has been recalled, expired, or is otherwise not suitable for use. Upon detecting such a product, the system refuses access to the micro-warehouse until an administrator removes the product or otherwise addresses the situation.
The invention also provides a method of distributing a plurality of products from a micro-warehouse. The method may include fitting each product with a radio frequency identification tag, positioning the plurality of products in the micro-warehouse, sensing opening and closing of the micro-warehouse door, scanning the plurality of products in the micro-warehouse upon sensing closing of the door to determine the number and type of products in the micro-warehouse, generating a message based on the number and type of products in the micro-warehouse, transmitting the message to a remote processor or server, and maintaining an inventory in the server based on the message.
The method and system permit up-to-date information to be provided to the server which, in turn, can be connected to ordering and manufacturing information systems to ensure prompt re-stocking of the micro-warehouses. The system can be designed with multiple levels of access. For example, multiple micro-warehouses may be located within a secure room and a user badge may be encoded to permit a user to access the room only, a limited number of warehouses in the room, or all the warehouses in the room.
As is apparent from the above, it is an advantage of the present invention to provide a method and system of identifying and distributing products. Other features and advantages of the present invention will become apparent by consideration of the detailed description and accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
In the drawings:
FIG. 1 is a schematic diagram of a system embodying the invention.
FIG. 2 is schematic diagram of the server and client controller of the system shown in FIG. 1 illustrating the architecture of the enterprise application of the server and the architecture of the software on the client controller.
FIG. 3 is an illustration of the flow of products and information in a distribution system of the invention.
FIG. 4 a is a flowchart of the software's boot up routine of the invention.
FIG. 4 b is a flowchart of the software of the invention.
Before the invention is explained in detail, it is to be understood that the invention is not limited in its application to the details of the construction and the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
FIG. 1 illustrates a system 10 embodying the invention. The system 10 includes two servers (maintenance and commerce) 11 and 12 that create and maintain user lists, perform inventory, account, ordering functions, and monitoring functions, such as microwarehouse status, monitoring temperature and other faults. Servers 11 and 12 may communicate with a client (discussed below) using standard protocols such as TCP/IP, or other protocols over a network 13. The network 13 may be the Internet, a telephone network, a wireless network, power line carrier (“PLC”) network, or combinations thereof. Servers 11 and 12 include standard hardware and operating system software (not shown). Running on top of the hardware and operating system software is a micro-warehouse (“MW”) enterprise application 14. The MW enterprise application 14 accesses a profile database 15 that includes a registration module 16, an order history module 18, an account set-up module 20, and a stock request module 22. Each of the modules 16-22 is maintained for each client coupled to the server 12. The modules may be configured with web content designed to be accessible using protocols for the World Wide Web section of the Internet.
As best seen by reference to FIG. 2, the MW enterprise application 14 performs numerous functions. Broadly, the MW enterprise application 14 controls the arrangement of the RFID user badges (discussed below), manages communication sessions with clients connected to the server 12, maintains an inventory of products for each client connected to the servers 11 and 12, checks inventory of the MW and other local MWs before ordering a product, manages security of communications, provides system administration functionality, and monitors and maintains the health of clients connected to the servers.
The registration module 16 provides part of the inventory functionality of the server 12 by providing access to information regarding the location of clients connected to the server 12. In the invention, the clients take the form of MWs. The registration module also provides access to information regarding sales persons assigned to a particular MW and identification numbers for each MW. The registration module 16 may access a MW database 24.
The order history module 18 provides a history of orders for each MW and product preferences for each MW. The account set-up module provides administrative screens for payment authorization, user information, and similar information. The stock request module 22 controls inventory replenishment based on usage and on specific customer requests and similar information.
The server 12 also accesses a commerce engine 30 that uses information received from the client to generate orders that are delivered to the manufacturing infrastructure (not shown) that produces products to be distributed using the system and method of the invention. The information may be used by marketing, customer relation management (“CRM”), billing, and other systems and functions. For example, the invention may be used in the distribution of life science research products such as enzymes, assays, cloning vectors, component cells, and the like. (Of course, a wide variety of non-biological products could be distributed using the invention.) The information provided by the server 12 is used in the manufacturing infrastructure to ensure proper production of products according to the demand for such products. As noted above, the server 12 may be coupled to a plurality of clients. An exemplary client in the form of a MW 35 is shown in FIGS. 1 and 2. While only one client is shown, the number of clients connected to the server 12 is limited only by the server's internal capacity and the capacity of the network 13.
The MW 35 may take the form of a refrigerated cabinet, a freezer, or other storage container. A secured storeroom, similar location, or other defined area could also be outfitted with a client controller and other components, as described herein, and be used to store products. As shown, the MW 35 includes a door 37, an electric actuated lock 39 and/or a proximity sensor 40, and an output device that may take the form of audio device or light 41. Other output devices such as a voice synthesis device, a display screen, and the like may also be used. The MW 35 is configured with an antenna array 43. The antenna array 43 is coupled to a client controller 45. In one embodiment, the invention may include an antenna with two vertically polarized array antennas. The antenna 43 is an RF receive and transmit device which communicates with a transponder device or tag (discussed in greater detail below). In one embodiment, the tag is a passive tag and powered by energy from the antenna.
The MW 35 may include a specialized card reader 47 in the form of a magnetic card swipe device, an antenna, a fingerprint reader, or similar device. The specialized card reader 47 is coupled to the client controller 45 via a communication link 49. The MW 35 may also include an internal and ambient temperature sensor 55. If included, the temperature sensor 55 is preferably positioned such that it can sense the temperature of the interior of the MW 35. The temperature sensor 55 is coupled to the client controller 45 to provide temperature information to the client controller. Additional information may be provided to the client controller through optional input devices. The location of the MW 35 may be monitored by a global positioning system (GPS) device (not shown) plus inertial frame recognition for fine measurement and for interpolation between GPS satellite acquisitions. The voltage, frequency, and other characteristics of electrical supply lines may be monitored and provided to the client controller 45 by a power line monitoring device (also not shown). Additional input devices, such as cameras, microphones, sensors, etc., could be coupled to the client controller to monitor environmental and other conditions.
The client controller 45 includes software to carry out several functions. The software included on the client controller 45 may be better understood by reference to FIG. 2. As shown, the client controller 45 includes an operating system 60. The operating system 60 is dependent on the type of processor used in the client controller. Preferably, the client controller 45 is an X86 single chip computer controller with a compatible operating system. If desired, the client controller 45 may be a consumer grade device such as a Palm Pilot personal digital assistant or Packet PC device, and modified according to the teachings herein. Depending on the hardware used, the client controller 45 may be configured with a graphical user interface (“GUI”) to facilitate interaction between the system 10 and its users.
The client controller 45 also includes an I/O interface 62, which may take the form of an analogue-digital, digital-analogue converter, digital input/output (ADC, DAC, and DIO) interface. The interface 62 handles input from the electric actuated lock 39, input from the temperature sensor 55, output to the electric actuated lock 39, and input from optional monitoring devices such as the GPS and power line monitoring devices.
In addition to the interface 62, the client controller 45 may have two other modules: an RFID user sensing subsystem 64 and a radio frequency data collector (“RFDC”) inventory interface 66. The RFID user sensing subsystem 64 handles input and output to and from the specialized card reader 47. The RFDC inventory interface 66 handles input and output from the antenna 43 and handles links or sessions between the MW 35 and servers 11 and 12.
The client controller 45 includes software (not shown) which may incorporate the RFDC inventory interface 66 that reads the RFID signatures from tagged products (discussed below) placed inside the MW 35. The software may be implemented according to algorithms disclosed in International Publication No. WO99/45495 and International Publication No. WO99/45494, the disclosures of which are hereby incorporated by reference herein. The referenced publications teach identification systems that can identify a plurality of RFID tagged items using an interrogator. The interrogator sends signals from antennas and cooperates with passive, transponder RFID tags in such a way as to eliminate or reduce interference problems that are typically associated with reading RF signals from multiple devices. The system 10 could also be implemented with active tags, although presently available active tags need to be improved so as to perform in the temperatures that the system is expected to operate within and at roughly the same cost and power consumption.
Before the system 10 may be implemented, one or more RFID access badges 75 must be generated. Preferably, the RFID badges 75, as well as the other RFID tags (discussed below) are passive transponder tags such as the tags disclosed in the above-referenced international applications. Preferably, the RFID badges 75 are encoded with information from the account set-up module 20 based on digital signatures. In addition, it is preferred that the digital signatures encoded on the RFID badges 75 used by restocking services provide one-time access to a specific MW, and thereafter expire. The RFID access badges may be fixed on a carton of products 80. Alternatively, they may be delivered separately to the facility where the MW of interest is located.
The carton of products 80 includes a plurality of individual products 90 each with an identification tag 95. Each identification tag 95 may be the same as an RFID badge 75, except that the digital signature on tag 95 will generally not expire. In one form of the invention, each tag 95 has a 16-bit identification code and a 72-bit item identification code. The 16-bit identification tag may be programmed with information such as the manufacturer of the product. The 72-bit item identification code is used to provide descriptive information regarding the product such as serial number, product type, date, lot number, and similar information.
Once all the products 90 have been fitted with unique RFID tags 95, the products may be shipped in the carton 80 to a designated MW such as the MW 35. As shown in FIG. 3, the carton 80 is packed according to a fulfillment request that is based on either an initial order from a customer (not shown) or MW specific business rules followed by the server 12. The carton 80 may be fitted with RFID access badge 75 or the RFID access badge 75 may be shipped separately to the location of the MW of interest. If fitted with an RFID access badge 75, the carton 80 may be shipped by a delivery service contracted to deliver the package to the MW 35. Once the carton is delivered, the recipient or user may use the RFID access badge 75 to open the door 37 of the MW 35 by passing RFID access badge 75 in front of the reader 47. Client controller 45 reads the digital signature of the RFID access badge 75 and confirms reading of the code by actuating a user feedback device such as a voice synthesis module or the light 41. Since, the server 12 provides a locally based user list to the client controller 45, the client controller 45 oversees authentication of the digital code read from the RFID access badge 75. Client controller 45 checks the authenticity of the read code by matching the code to the user list. Client controller 45 may then optionally read the temperature sensors 55 and transmit temperature information to the server 11. Preferably, the temperature sensor is also read on a periodic basis, with the temperature information being transmitted to the server each time the temperature is read. Client controller 45 can also be programmed to transmit temperature data if the temperature falls beneath or above a predetermined range. In many instances, it will be important to ensure that the temperature of the MW is within an appropriate range to store the products 90. If the temperature of the MW 35 is within an appropriate range, and the user is authenticated, the client controller 45 then actuates the lock 39 to open the door 37 (of course, the MW need not be equipped with the lock 39). If the temperature of the MW 35 is not within an appropriate range, then access to the MW may be prevented by maintaining the lock 39 in a closed state. This would allow a refrigerated unit associated with the MW to cool the interior space of the MW to a desired temperature before ambient air was allowed into the MW by opening of the door. This also provides for product integrity during power failure.
Once the door 37 opens (which may be sensed by the proximity sensor 40), a communication session between the MW 35 and servers 12, which may be segmented based on appropriate events to optimize user response and network usage, begins. Having full access to the MW 35, the employee of a carrier or logistic service who delivered the carton 80 now proceeds to place the individual items 90 into the MW 35. Once the carton of products 80 is empty, the delivery employee then closes the door 37, and removes the carton, if necessary. The proximity sensor 40 senses the closing of the door 37. The client controller 45 senses the status of the sensor. Preferably, the lock 39 (if used) resets automatically after being unlocked for a predetermined time, for example five (5) seconds. The user has that predetermined time to open the door. The RFDC inventory interface 66 is disabled once the door 37 opens. When the door 37 closes, the RFDC inventory interface 66 is enabled and initiates a scan of the products placed within the MW 35. Upon completing the scan, the client controller 45 sends a change-in-inventory message 100 to the commerce server 12. To ensure integrity of the inventory change billed to the customer, the client controller 45 employs an integrity algorithm when the RFDC inventory interface 66 scans the MW 35. The algorithm is based on statistical information, historical information, and other factors including RF algorithms (frequency-hopping, etc.) and delay data.
The MW 35 may be accessed by a customer at the MW location using a separate RFID badge 75 shipped directly to that customer. Alternatively, and as noted above, the reader 47 may be configured as a magnetic card swipe device, barcode, a fingerprint reader, or some similar device that controls access to the MW 35. Regardless of its exact configuration, the reader 47 reads the input from the customer and acknowledges reading of that input by lighting the light 41. The client controller 45 then sends an input signal to the server 12. The server 12 then conducts an authenticity review of the input. If an authorized input is received, the server 12 sends an okay message to the MW 35. The client controller 45 may have the capability to authenticate the review as well. Once authentication takes place, the client controller 45 then opens the door 37 allowing the customer access to the interior of the MW 35. The customer then removes one or more products 90 from the interior of the MW and then closes the door 37. Once the door is closed, client controller 45 scans the remaining products in the MW 35 and sends a message containing the missing products to the server 12. Identifying which products have been taken, the server 12 compares the previous inventory prior to opening, to the inventory of the missing items. From the comparison, the server 12 determines the missing items in the MW 35. The inventory information is then communicated to the commerce engine 30, which stores the information for future use for both marketing and inventory functions. Receipts for the used products can then be emailed or printed and shipped via regular mail to the customer at the MW location. Invoicing can also occur using electronic and standard mechanisms.
The inventory message can be used for other purposes as well. For example, the inventory message includes information regarding individual products. Therefore, the amount of time a particular product spends in any MW may be recorded by the server, as well as the product's temperature history. If this time is recorded, it is also possible to compare the amount of time any particular product spends in a MW to a shelf life for that product. Temperature history can also be stored and compared to other data. If the shelf life is passed, then an expiration message, such as a pick list, may be generated and sent to the MW or an e-mail address of a user of the system to inform users of products that should be removed from the MW and not used. In addition, the inventory message may be used to determine the type of products in the MW 35. If any of the products present within the MW 35 are subject to a recall, the MW 35 may be placed in a “lock down” condition, whereby access to the MW is denied until an administrator or other authorized individual removes the recalled product or otherwise addresses the situation.
FIGS. 4 a and 4 b are flow charts of the software used in the invention. Once the client controller 45 is turned on in FIG. 4 a at step 138, it executes a standard boot up routine at step 140. Part of the standard boot up process enables the software to automatically update itself. At step 142, a message is sent to the maintenance server 11 to query the current version of the controller software. If the version on the server 11 is the same as the version on the client controller 45, the client controller 45 establishes a wait state as shown in step 152. If the version on the server 11 is newer than the version on the client controller 45, then the newer version is downloaded over the Internet, as shown at step 144. The newer version is loaded into the alternative pocket or partition and written to flash memory, as shown at step 146. Then the software is booted, as shown at step 148. A garbage collection routine clears the old version. A message packet accompanies each boot to the maintenance server, including version status and operating status. Each boot then requests a reload of the list of authorized users from the server 11 at step 150. The list is then reloaded at step 151. As shown in FIG. 4 b at step 152, the client controller 45 then establishes the wait state of the system by initializing various variables or objects such as a USER, MSG 1, MSG 2, CNT1, TEMP 1, TEMP 2, and SOLENOIDS. In addition, the client controller 45 initializes variables or objects SWITCHES, POWER, and LIGHT. Once initialization is complete, the unit is ready for user access. During this wait state, the client controller 45 performs periodic checks on the status of the MW 35. When a customer approaches the MW and presents an RFID badge, the client controller 45 reads the user RFID badge at step 154 and checks the validity of the identification code read from the badge at step 158. If the code does not match a valid code, an invalid user message is generated at step 162. The message may be displayed on an output device (not shown). If an optional lock is installed on the door of the MW 35, the client controller 45 then opens the solenoids in the lock on the MW 35, as shown at step 166, if the code is valid. An internal timer is then started, as shown at step 170. In one embodiment of the invention, the proximity sensor 40 is used to detect opening of the door 37 and the status of the door. Once the door opens, the proximity sensor 40 switches its status. At step 174, the client controller 45 checks to see if the door has been opened by reading the status of the proximity sensor 40. If the proximity sensor 40 has not changed status, the client controller 45 will continue to check for a predetermined amount of time, as shown at step 178. If the predetermined amount of time is exceeded, the solenoids are closed (step 182), which locks the lock 39, a timeout error message is generated (step 184), and the client controller 45 returns to the initial state, as shown at step 186.
If the door 37 is opened within the predetermined amount of time (currently set through practice at five (5) seconds), a second timer is started, as shown at step 190. The client controller 45 then records the internal temperature of the MW 35 at step 194 and then checks to see if the door 37 has been closed at step 200. The client controller 45 continues to check for closing of the door for a predetermined amount of time, as shown at step 204. If the predetermined amount of time expires, a close door message is generated as shown at step 208 and steps 190-204 are re-executed.
Once the door 37 is closed, the client controller 45 closes the solenoids, as shown at step 212. The client controller 45 then confirms that the door 37 is closed at step 216 and performs an inventory scan at step 220. The data from the inventory scan is then sent to the server 12, as shown at step 224. The client controller 45 then returns to the initial state (step 186).
In another embodiment, the system utilizes a defined area to enclose the tagged products rather than a cabinet. The defined area uses an access point to serve as its entryway. The products within the area are fitted with identification tags and specifically positioned in the area to be recognized by the RFDC inventory interface. Product scans begin when a sensor senses a user passing through the access point. The access point is controlled by a processor, such as the client controller 45, and is able to restrict access to the area and products, if necessary.
As can be seen from the above, the invention provides a method and system for distributing products. Various features and advantages of the invention are set forth in the following claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3827053||Feb 28, 1972||Jul 30, 1974||Volkers D||Antenna with large capacitive termination and low noise input circuit|
|US3861433||Sep 17, 1973||Jan 21, 1975||Plastofilm Ind Inc||Air tight food container|
|US3918671||Nov 26, 1974||Nov 11, 1975||Nifco Inc||Bar antenna holder|
|US4116512||Nov 8, 1976||Sep 26, 1978||Wiser John A||Drawer latching device|
|US4118693 *||May 9, 1977||Oct 3, 1978||Knogo Corporation||Method and apparatus for producing uniform electromagnetic fields in an article detection system|
|US4223830||Aug 18, 1978||Sep 23, 1980||Walton Charles A||Identification system|
|US4227037||May 29, 1979||Oct 7, 1980||Gulf & Western Manufacturing Company||Shielded non-metallic container|
|US4354613||May 15, 1980||Oct 19, 1982||Trafalgar Industries, Inc.||Microprocessor based vending apparatus|
|US4414690||Jun 15, 1981||Nov 8, 1983||U.S. Philips Corporation||Active aerial|
|US4496406||Jul 11, 1983||Jan 29, 1985||General Dynamics, Pomona Division||Protecting electrosensitive components|
|US4580041||Dec 9, 1983||Apr 1, 1986||Walton Charles A||Electronic proximity identification system with simplified low power identifier|
|US4616694||Oct 22, 1984||Oct 14, 1986||Hsieh Shih Yung||Fireproof cabinet system for electronic equipment|
|US4636634||Aug 28, 1984||Jan 13, 1987||Veeco Integrated Automation, Inc.||Apparatus with intelligent bins indicating the presence and identity of stored coded articles|
|US4636950||Aug 28, 1985||Jan 13, 1987||Caswell Robert L||Inventory management system using transponders associated with specific products|
|US4639875||May 17, 1984||Jan 27, 1987||Abraham Joseph N||Quantity checking system and method|
|US4656463||Apr 21, 1983||Apr 7, 1987||Intelli-Tech Corporation||Monitoring and control system|
|US4688026||Apr 21, 1986||Aug 18, 1987||Scribner James R||Method of collecting and using data associated with tagged objects|
|US4694283||Oct 29, 1982||Sep 15, 1987||Reeb Max E||Identification device in the form of a tag-like strip affixable to an article|
|US4746830||Mar 14, 1986||May 24, 1988||Holland William R||Electronic surveillance and identification|
|US4785969||Nov 10, 1986||Nov 22, 1988||Pyxis Corporation||Medication dispensing system|
|US4837568||Jul 8, 1987||Jun 6, 1989||Snaper Alvin A||Remote access personnel identification and tracking system|
|US4847764||May 21, 1987||Jul 11, 1989||Meditrol, Inc.||System for dispensing drugs in health care institutions|
|US4860918||Dec 23, 1986||Aug 29, 1989||Holland Heating Bv||System for constructing air conditioning cabinets and method for constructing same|
|US4862160||Mar 20, 1987||Aug 29, 1989||Revlon, Inc.||Item identification tag for rapid inventory data acquisition system|
|US4866661||Mar 26, 1986||Sep 12, 1989||Prins Maurits L De||Computer controlled rental and sale system and method for a supermarket and the like|
|US4881061||Dec 5, 1988||Nov 14, 1989||Minnesota Mining And Manufacturing Company||Article removal control system|
|US4961533||Oct 30, 1989||Oct 9, 1990||Viac Inc.||Inventory control system|
|US5008814||Aug 15, 1988||Apr 16, 1991||Network Equipment Technologies, Inc.||Method and apparatus for updating system software for a plurality of data processing units in a communication network|
|US5014875||Mar 1, 1989||May 14, 1991||Pyxis Corporation||Medication dispenser station|
|US5019815||Mar 3, 1987||May 28, 1991||Lemelson Jerome H||Radio frequency controlled interrogator-responder system with passive code generator|
|US5021800||Jan 5, 1990||Jun 4, 1991||Kenneth Rilling||Two terminal antenna for adaptive arrays|
|US5030807||Jan 16, 1990||Jul 9, 1991||Amtech Corporation||System for reading and writing data from and into remote tags|
|US5036308||Dec 22, 1989||Jul 30, 1991||N.V. Nederlandsche Apparatenfabriek Nedap||Identification system|
|US5038023||Jun 28, 1989||Aug 6, 1991||C. Itoh Information Systems Development, Inc.||System for storing and monitoring bar coded articles such as keys in a drawer|
|US5091713||May 10, 1990||Feb 25, 1992||Universal Automated Systems, Inc.||Inventory, cash, security, and maintenance control apparatus and method for a plurality of remote vending machines|
|US5099226||Jan 18, 1991||Mar 24, 1992||Interamerican Industrial Company||Intelligent security system|
|US5103222||Jun 30, 1988||Apr 7, 1992||N.V. Nederlandsche Apparatenfabriek Nedap||Electronic identification system|
|US5117407||Feb 8, 1989||May 26, 1992||Vogel Peter S||Vending machine with synthesized description messages|
|US5144314||Dec 11, 1991||Sep 1, 1992||Allen-Bradley Company, Inc.||Programmable object identification transponder system|
|US5155847||Aug 3, 1988||Oct 13, 1992||Minicom Data Corporation||Method and apparatus for updating software at remote locations|
|US5194856||Jun 7, 1991||Mar 16, 1993||Ericsson Radio Systems B.V.||System for detecting the presence in a rack of a portable unit suitable for transmitting or receiving a signal containing an identification number assigned thereto|
|US5208599||Aug 28, 1991||May 4, 1993||Ohio State University||Serrated electromagnetic absorber|
|US5214409||Dec 3, 1991||May 25, 1993||Avid Corporation||Multi-memory electronic identification tag|
|US5231844||Jan 21, 1992||Aug 3, 1993||Samsung Electronics Co., Ltd.||Defrost control method for refrigerator|
|US5240139||Mar 6, 1992||Aug 31, 1993||Munroe Chirnomas||Package vending machine|
|US5260690||Jul 2, 1992||Nov 9, 1993||Minnesota Mining And Manufacturing Company||Article removal control system|
|US5266925||Sep 30, 1991||Nov 30, 1993||Westinghouse Electric Corp.||Electronic identification tag interrogation method|
|US5285041||Sep 14, 1992||Feb 8, 1994||Wright Food Systems, Inc.||Automated food vending system|
|US5287414||Jun 21, 1991||Feb 15, 1994||Esselte Pendaflex Corporation||Coded file locator system|
|US5294931||Apr 29, 1992||Mar 15, 1994||Texas Instruments Deutschland Gmbh||Method of interrogating a plurality of transponders arranged in the transmission range of an interrogating device and transponders for use in the said method|
|US5327118||Sep 8, 1993||Jul 5, 1994||Sensormatic Electronics Corporation||EAS system with alternating on/off transmitter operation and loop antenna|
|US5335509||Jul 28, 1993||Aug 9, 1994||Dianna Namisniak||Food inventory system|
|US5365551||Dec 15, 1992||Nov 15, 1994||Micron Technology, Inc.||Data communication transceiver using identification protocol|
|US5389919||Nov 19, 1992||Feb 14, 1995||Meridian, Inc.||Electronic interlock for storage assemblies with communication|
|US5392025||Sep 24, 1993||Feb 21, 1995||Intermark Corporation||Electronic security system for display cabinets|
|US5408443||Jul 15, 1993||Apr 18, 1995||Polypharm Corp.||Programmable medication dispensing system|
|US5410315||Dec 8, 1992||Apr 25, 1995||Texas Instruments Incorporated||Group-addressable transponder arrangement|
|US5421009||Dec 22, 1993||May 30, 1995||Hewlett-Packard Company||Method of remotely installing software directly from a central computer|
|US5424858||Sep 3, 1993||Jun 13, 1995||Or-An Company International, Inc.||Apparatus for locating file folders|
|US5431299||Jan 26, 1994||Jul 11, 1995||Andrew E. Brewer||Medication dispensing and storing system with dispensing modules|
|US5446447||Feb 16, 1994||Aug 29, 1995||Motorola, Inc.||RF tagging system including RF tags with variable frequency resonant circuits|
|US5450070||Apr 4, 1994||Sep 12, 1995||Massar; Sheppard||Electronic missing file locator system|
|US5460294||May 12, 1994||Oct 24, 1995||Pyxis Corporation||Single dose pharmaceutical dispenser subassembly|
|US5471203||Feb 1, 1995||Nov 28, 1995||Fujitsu Limited||Admission managing system|
|US5487276||May 5, 1994||Jan 30, 1996||Namisniak; Dianna||Food inventory system|
|US5487764||Dec 13, 1994||Jan 30, 1996||Covol Technologies, Inc.||Reclaiming and utilizing discarded and newly formed coke breeze, coal fines, and blast furnace revert materials, and related methods|
|US5489908||Jul 27, 1994||Feb 6, 1996||Texas Instruments Deutschland Gmbh||Apparatus and method for identifying multiple transponders|
|US5491715||Jun 28, 1993||Feb 13, 1996||Texas Instruments Deutschland Gmbh||Automatic antenna tuning method and circuit|
|US5495961||Sep 12, 1994||Mar 5, 1996||Maestre; Federico A.||Portable programmable medication alarm device and method and apparatus for programming and using the same|
|US5500650||Dec 15, 1992||Mar 19, 1996||Micron Technology, Inc.||Data communication method using identification protocol|
|US5519381||Nov 18, 1993||May 21, 1996||British Technology Group Limited||Detection of multiple articles|
|US5520450||Aug 2, 1994||May 28, 1996||Pyxis Corporation||Supply station with internal computer|
|US5521601||Apr 21, 1995||May 28, 1996||International Business Machines Corporation||Power-efficient technique for multiple tag discrimination|
|US5528222||Sep 9, 1994||Jun 18, 1996||International Business Machines Corporation||Radio frequency circuit and memory in thin flexible package|
|US5528232||May 20, 1994||Jun 18, 1996||Savi Technology, Inc.||Communication system|
|US5530702||May 31, 1994||Jun 25, 1996||Ludwig Kipp||System for storage and communication of information|
|US5537105||Jan 3, 1992||Jul 16, 1996||British Technology Group Limited||Interrogator for identifying a prescribed source|
|US5539394||Jun 20, 1995||Jul 23, 1996||International Business Machines Corporation||Time division multiplexed batch mode item identification system|
|US5541604||Sep 3, 1993||Jul 30, 1996||Texas Instruments Deutschland Gmbh||Transponders, Interrogators, systems and methods for elimination of interrogator synchronization requirement|
|US5550547||Sep 12, 1994||Aug 27, 1996||International Business Machines Corporation||For communicating with a base station|
|US5557280||Aug 25, 1993||Sep 17, 1996||British Technology Group Limited||Synchronized electronic identification system|
|US5564803||Mar 21, 1994||Oct 15, 1996||Automated Healthcare, Inc.||Portable nursing center|
|US5565858||Sep 14, 1994||Oct 15, 1996||Northrop Grumman Corporation||Electronic inventory system for stacked containers|
|US5573082||Jun 7, 1995||Nov 12, 1996||Diner-Mite, Inc.||Manual food service system|
|US5583819||Jan 27, 1995||Dec 10, 1996||Single Chip Holdings, Inc.||Apparatus and method of use of radiofrequency identification tags|
|US5600121||Mar 20, 1995||Feb 4, 1997||Symbol Technologies, Inc.||Optical reader with independent triggering and graphical user interface|
|US5602538||Jul 27, 1994||Feb 11, 1997||Texas Instruments Incorporated||Apparatus and method for identifying multiple transponders|
|US5606902||Nov 15, 1995||Mar 4, 1997||Smc Kabushiki Kaisha||Linear actuator|
|US5608298||Jan 3, 1995||Mar 4, 1997||Harrow Products, Inc.||Privacy protection for electronic lock system|
|US5608739||Sep 8, 1995||Mar 4, 1997||Micron Technology, Inc.||Apparatus and method for error detection and correction in radio frequency identification device|
|US5621199||Apr 3, 1995||Apr 15, 1997||Datalogic, Inc.||RFID reader|
|US5627517||Nov 1, 1995||May 6, 1997||Xerox Corporation||In a distribution system|
|US5627544||Mar 18, 1996||May 6, 1997||Micron Technology, Inc.||Data communication method using identification protocol|
|US5629981 *||Jul 29, 1994||May 13, 1997||Texas Instruments Incorporated||Information management and security system|
|US5648765||Mar 8, 1995||Jul 15, 1997||Cresap; Michael S.||Tag tansponder system and method to identify items for purposes such as locating, identifying, counting, inventorying, or the like|
|US5648767||Nov 30, 1994||Jul 15, 1997||Hughes Aircraft||Transponder detection system and method|
|US5680459||Apr 28, 1995||Oct 21, 1997||Kasten Chase Applied Research Limited||Passive transponder|
|US5686902||Apr 23, 1996||Nov 11, 1997||Texas Instruments Incorporated||Communication system for communicating with tags|
|US5689238||Mar 8, 1996||Nov 18, 1997||Lucent Technologies, Inc.||Object locator system and methods therefor|
|US5699066||Jun 17, 1996||Dec 16, 1997||British Technology Group Limited||Synchronized electronic identification system|
|US5701252||Aug 1, 1994||Dec 23, 1997||Facchin; Daniela||Distribution network system for products and information|
|US5708423 *||May 9, 1995||Jan 13, 1998||Sensormatic Electronics Corporation||Zone-Based asset tracking and control system|
|US5764992 *||Jun 6, 1995||Jun 9, 1998||Apple Computer, Inc.||On a computer|
|US5959606 *||Oct 24, 1994||Sep 28, 1999||Etec Systems, Inc.||Rasterizer for pattern generator|
|US6131399 *||Dec 4, 1998||Oct 17, 2000||Hall; Donald M.||Refrigerated vending machine|
|US6327576 *||Sep 21, 1999||Dec 4, 2001||Fujitsu Limited||System and method for managing expiration-dated products utilizing an electronic receipt|
|US6407665 *||Mar 1, 2001||Jun 18, 2002||Key-Trak, Inc.||Object tracking system with non-contact object detection and identification|
|US6843720 *||Jan 24, 2001||Jan 18, 2005||Sierra Design Group||Apparatus and method for dispensing prizes|
|US7020680 *||Aug 6, 2001||Mar 28, 2006||Isochron, Llc||System and method for monitoring and control of beverage dispensing equipment|
|US20040069850 *||Jan 31, 2002||Apr 15, 2004||De Wilde Eric D.||Truck cargo management rfid tags and interrogators|
|1||"13.56MHz Air Interface Proposal," Checkpoint systems, Inc. and Microchip Technology, Inc., Aug. 11, 1999.|
|2||"Air Interfaces: Communications and Interfaces: Part B: Parameter Values for 2.45 GHz Narrow Band RFID Systems", Jun. 1, 1999.|
|3||"Comments on the joint proposal by Gemplus and Checkpoint for a universal wake-up command (at 13.56MHz)", Alain Berthon, Texas Instruments, May 17, 2000, pp. 1-3.|
|4||"Field Re-programmable Item Management Air Interface Standard Proposal for 13,56 MHz," Gemplus 13 MHZ Air Interface Proposal, ISO/SC31/WG4/SG3 Gemplus NP, Jun. 21, 1999.|
|5||"Mobil Speedpass Makes Gasoline Purchase Virtually Effortless", Business Wire, Feb. 19, 1997, Copyright 1997 Business Wire, Inc., Business Wire, pp. 1-2.|
|6||"Multiple Frequency Anti-collision Protocol," Inferneon Technologies AG, ISO/8EC JTC 1/SC31 Workung Group 4-Radio Frequency Identification for Item Management, Mar. 23, 2000.|
|7||"Radio Frequency Identification System-13.56 MHz", Feb. 7, 1997, pp. 1-20.|
|8||"Technical report for RFID systems operating in the 2.45 GHz ISM band", Jul. 4, 1999, revised Aug. 19, 1999, pp. 1-51.|
|9||Apr. 13, 2006 Supplementary Partial European Search Report in European Application No. 03713485.|
|10||Apr. 18, 2008 Korean Official Action in Korean Patent Appln. No. 7000578/2008 (with translation).|
|11||Aug. 1, 2003 International Search Report in International Patent Appln. No. PCT/US02/40967.|
|12||Aug. 15, 2006 Canadian Official Action in Canadian Patent Appln. No. 2,425,189.|
|13||Aug. 22, 2007 Official Action in Mexican Patent Appln. No. PA/a/008056 (with partial translation).|
|14||Aug. 6, 2007 Official Action in Korean Patent Appln. No. 45398/2007 (with partial translation).|
|15||Aug. 8, 2005 Official Action in U.S. Appl. No. 10/870,938.|
|16||Binzoni, et al., "SCS Corporation Announces Radio Frequency Identification Installation At A Major Airport.", Oct. 5, 1999.|
|17||Brakeman, Lynne, "RFID Baggage Tracking Solution Helps Keep SFIA Secure," Jul. 1, 2001.|
|18||Dec. 12, 2006 Japanese Official Action in Japanese Patent Appln. No. 2002-538343 (with partial translation).|
|19||Dec. 14, 2007 Mexican Official Action translation in Mexican Patent Appln. No. PA/a/2004/008056.|
|20||Dec. 24, 2007 Korean Official Action in Korean Patent Appln. No. 45389/2007 (with translation).|
|21||Dec. 24, 2007 Korean Official Action in Korean Patent Appln. No. 45392/2007 (with translation).|
|22||Dec. 24, 2007 Korean Official Action in Korean Patent Appln. No. 45394/2007 (with translation).|
|23||Dec. 27, 2007 Korean Official Action in Korean Patent Appln. No. 45396/2007 (with translation).|
|24||Dec. 31, 2008 First Examination Report in Indian Patent Appln. No. 969/KOLNP/2004.|
|25||Feb. 11, 2008 Korean Official Action in Korean Patent Appln. No. 45398/2007 (with translation).|
|26||Feb. 15, 2007 Communication in Korean Patent Application No. 7027537/2006 (with a English-language translation).|
|27||Feb. 27, 2008 Korean Official Action in Korean Patent Appln. No. 45389/2007 (with translation).|
|28||Feb. 3, 2006 Official Action in U.S. Appl. No. 10/795,386.|
|29||Feb. 7, 2008 Official Communication in European Patent Appln. No. 03 713 485.5 - 1238.|
|30||Jan. 17, 2005 Official Action in Canadian Patent Appln. No. 2,425,189.|
|31||Jan. 27, 2006 Official Action in U.S. Appl. No. 10/870,938.|
|32||Jan. 28, 2005 Official Action in U.S. Appl. No. 10/795,386.|
|33||Jan. 3, 2007 European Official Action in European Patent Appln. No. 01 919 848.7.|
|34||Jul. 14, 2005 Official Action in U.S. Appl. No. 10/795,386.|
|35||Jul. 14, 2006 Supplementary European Search Report in European Application No. 03713485.5.|
|36||Jun. 22, 2007 Official Action in Japanese Patent Appln. No. 2003-571829 (with partial translation).|
|37||Jun. 25, 2007 Official Action in Korean Patent Appln. No. 45389/2007 (with partial translation).|
|38||Jun. 25, 2007 Official Action in Korean Patent Appln. No. 45392/2007 (with partial translation).|
|39||Jun. 25, 2007 Official Action in Korean Patent Appln. No. 45394/2007 (with partial translation).|
|40||Jun. 25, 2007 Official Action in Korean Patent Appln. No. 45396/2007 (with partial translation).|
|41||Mar. 21, 2006 Official Action in U.S. Appl. No. 10/209,348.|
|42||Mar. 5, 2009 Canadian Official Action in Canadian Patent Appln. No. 2,425,189.|
|43||Mar. 6, 2008 Mexican Official Action translation in Mexican Patent Appln. No. PA/a/2004/008056.|
|44||May 18, 2007 Communication in Korean Patent Application No. 7013101/2004 (with a English-language translation).|
|45||May 20, 2005 Preliminary Examination Report in International Patent Appln. No. PCT/US03/04653.|
|46||May 3, 2005 Official Action in U.S. Appl. No. 10/209,348.|
|47||Moore, Bert, "RFID May Yet Prove Its Mettle On Metal," Frontline Solutions, Apr. 2001.|
|48||Nov. 13, 2007 Korean Official Action in Korean Patent Appln. No. 7013101/2004 (with translation).|
|49||Nov. 22, 2006 Official Action in U.S. Appl. No. 10/870,946.|
|50||Nov. 23, 2004 Official Action in European Patent Appln. No. 01 979 848.7.|
|51||Oct. 11, 2007 Official Action in Canadian Patent Appln. No. 2,425,189.|
|52||Oct. 20, 2003 International Search Report in International Patent Appln. No. PCT/US03/04653.|
|53||Oct. 4, 2007 Official Action in Singapore Patent Appln. No. 200403954-1.|
|54||Partial Translation of Russian Decision on Grant in Russian Patent Appln. No. 2004128075.|
|55||Rosen, Cheryl, "The Fast Track," InformationWeek.Com, Jun. 18, 2001.|
|56||Russian Official Action in Russian Application No. 2004128075 (with English language translation).|
|57||Senger, Nancy, "Making Airlines Safer With RFID," Business Solutions, Mar. 2000.|
|58||Sep. 11, 2006 Australian Written Opinion with Oct. 2, 2006 Singapore communication in Singapore Patent Appln. No. 200403954-1.|
|59||Sep. 13, 2004 Supplementary Search Report in European Patent Appln. No. 01 979 848.7.|
|60||Sep. 13, 2007 Official Action in European Patent Appln. No. 06 023 373.1.|
|61||Sep. 20, 2006 Communication in Russian Application No. 2004128075/09(030475) (with English-language translation).|
|62||Sep. 3, 2007 Official Action in Japanese Patent Appln. No. 2002-538343 (with partial translation).|
|63||Sharp, Kevin, "This "Killer App" Can Save Lives," ID Systems, Feb. 2000, Inc.|
|64||Siedsma, Andrea, "SCS Aims To Make Skies Friendlier For Air Travelers," Feb. 23, 2001.|
|65||Translation of Russian Decision on Grant in Russian Patent Appln. No. 2004128075.|
|66||Translation of Sep. 3, 2007 Official Action in Japanese Patent Appln. No. 2002-538343.|
|67||Wigglesworth, Zeke, "SFO Installing First-in-U.S. Security System," San Jose Mercury News, Feb. 18, 2001.|
|68||Woodyard, Chris, "Chips To Improve Baggage-Check Efficiency," Nov. 27, 2000, USA Today, Gannett Co., Inc.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7938326||Jan 27, 2010||May 10, 2011||Promega Corporation||RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags|
|US7967199 *||Jul 24, 2009||Jun 28, 2011||Promega Corporation||Radio frequency identification method and system of distributing products|
|US8056817 *||Feb 21, 2008||Nov 15, 2011||Advanced Custom Engineered Systems & Engineered Co.||System for monitoring items in a container|
|US8146798||Nov 19, 2008||Apr 3, 2012||Advanced Custom Engineered Systems & Equipment Co.||Method and apparatus for monitoring waste removal and administration|
|US8185277||Nov 7, 2008||May 22, 2012||Advanced Custom Engineered Systems & Equipment Co.||Waste removing and hauling vehicle|
|US8210428||Feb 21, 2008||Jul 3, 2012||Advanced Custom Engineered Systems & Equipment Co.||Method for handling discarded identification numbers|
|US8280784||Oct 19, 2006||Oct 2, 2012||International Business Machines Corporation||automatic inventory variance identification|
|US8714440||Jan 19, 2012||May 6, 2014||Advanced Custom Engineered Systems & Equipment Co.||Method and apparatus for monitoring waste removal and administration|
| || |
|U.S. Classification||235/381, 235/385|
|International Classification||B65G1/137, G06Q10/00, B65G61/00, G06K17/00, G07G1/00, G06F7/08, G07F9/02|
|Cooperative Classification||G06Q10/087, G07G1/0045, G06K2017/0067, G06K2017/0051, G07F9/02, G06Q10/08, F25D2700/08, G07F9/026, F25D2500/06|
|European Classification||G06Q10/08, G06Q10/087, G07F9/02D, G07F9/02, G07G1/00C2|
|Jun 29, 2014||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LINTON, WILLIAM A.;LINTON, JOHN;KRUEGER, JULIE A.;AND OTHERS;SIGNING DATES FROM 20011002 TO 20011009;REEL/FRAME:033206/0398
Owner name: PROMEGA CORPORATION, WISCONSIN
|Mar 22, 2013||FPAY||Fee payment|
Year of fee payment: 4